Publications

Found 405 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Schnorr, C. P. (1992).  Block Korkin-Zolotarev Bases and Successive Minima.
Scholl, M.., & Voisard A. (2009).  Spatial Operations and Map Operations. 2719-2725.
Scholz, R., & Ziem A. (2013).  Lexikometrie Meets FrameNet. 155-184.
Schomp, K., Allman M., & Rabinovich M. (2014).  DNS Resolvers Considered Harmful.
Schomp, K., Rabinovich M., & Allman M. (2016).  Towards a Model of DNS Client Behavior. Proceedings of Passive and Active Measurement Conference (PAM).
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2013).  On Measuring the Client-Side DNS Infrastructure. 77-90.
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2014).  Assessing DNS Vulnerability to Record Injection.
Schröder-Preikschat, W. (1993).  Design Principles of Parallel Operating Systems: ?A PEACE Case Study?.
Schryen, G. (2009).  A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors. 153-168.
Schryen, G. (2008).  Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. 37-50.
Schryen, G., & Kadura R.. (2009).  Open Source vs. Closed Source Software: Towards Measuring Security. 2016-2023.
Schryen, G. (2009).  Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.
Schuett, D.., Eckhardt U.., & Suda P.. (1992).  Boot Algebras.
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (In Press).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
Schulz, P., Matthé M., Klessig H., Simsek M., Fettweis G., Ansari J., et al. (2017).  Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture. IEEE Communications Magazine. 55(2), 
Schumacher, A., Pireddu L., Niemenmaa M., Kallio A., Korpelainen E., Zanetti G., et al. (2014).  SeqPig: Simple and Scalable Scripting for Large Sequencing Data Sets in Hadoop. Bioinformatics. 30(1), 119-120.
Schwarm, S.., Bulyko I., & Ostendorf M. (2004).  Adaptive Language Modeling with Varied Sources to Cover New Vocabulary Items. IEEE Transactions on Speech and Audio Processing. 12(3), 334-342.
Schwarz, C., Teich J., Welzl E., & Evans B. (1994).  On Finding a Minimal Enclosing Parallelgram.
Schwenk, H.. (1999).  Using Boosting to Improve a Hybrid HMM/Neural Network Speech Recognizer. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999).
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Scott, J., & Karp R. M. (2004).  Achieving Fairness Through Selective Early Dropping.
Scott, C., Wundsam A., Zarifis K., & Shenker S. (2012).  What, Where, and When: Software Fault Localization for SDN.
Scott, J., Ideker T. E., Karp R. M., & Sharan R. (2006).  Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks. Journal of Computational Biology. 13, 133-144.
Scott, J., Ideker T. E., Karp R. M., & Sharan R. (2005).  Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks. Proceedings of the 9th Annual International Conference on Research in Computational Molecular Biology (RECOMB'05). 133-144.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.

Pages