Publications

Found 1867 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Feigenbaum, J., Krishnamurthy A., Sami R., & Shenker S. J. (2001).  Approximation and Collusion in Multicast Cost Sharing. Proceedings of the Third ACM Conference on Electronic Commerce (ACM-EE 2001). 253-255.
Feigenbaum, J., Archer A.., Krishnamurthy A., Sami R., & Shenker S. J. (2004).  Approximation and Collusion in Multicast Cost Sharing. Games and Economic Behavior. 47(1), 36-71.
Feigenbaum, J., Krishnamurthy A., Sami R., & Shenker S. J. (2001).  Approximation and Collusion in Multicast Cost Sharing. Proceedings of the Third ACM Conference on Electronic Commerce (ACM-EE 2001). 253-255.
Feigenbaum, J., Archer A.., Krishnamurthy A., Sami R., & Shenker S. J. (2004).  Approximation and Collusion in Multicast Cost Sharing. Games and Economic Behavior. 47(1), 36-71.
M. Shokrollahi, A., & Stemann V. (1996).  Approximation of Complex Numbers by Cyclotomic Integers.
M. Shokrollahi, A., & Stemann V. (1996).  Approximation of Complex Numbers by Cyclotomic Integers.
Razaghpanah, A., Nithyanand R., Vallina-Rodriguez N., Sundaresan S., Allman M., Kreibich C., et al. (2018).  Apps, Trackers, Privacy and Regulators: A Global Study of the Mobile Tracking Ecosystem. Proceedings of NDSS 2018.
Friedland, G., Hensley E., Schumacher J., & Jain R. (2008).  Appscio: A Software Environment for Semantic Multimedia Analysis. 456-459.
Mitzel, D. J., Estrin D., Shenker S. J., & Zhang L. (1994).  An Architectural Comparison of ST-II and RSVP. Proceedings of the 13th IEEE Conference on Networking for Global Communications (INFOCOM '94). 2, 716-725.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 31-36.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 4(3), 31-36.
Sommer, R., Weaver N., & Paxson V. (2009).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
Paxson, V., Sommer R., & Weaver N. (2007).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. 1-7.
Huebsch, R., Chun B., Hellerstein J. M., Loo B. Thau, Maniatis P., Roscoe T., et al. (2005).  The Architecture of PIER: An Internet-Scale Query Processor. Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005). 28-43.
Huebsch, R., Chun B., Hellerstein J. M., Loo B. Thau, Maniatis P., Roscoe T., et al. (2005).  The Architecture of PIER: An Internet-Scale Query Processor. Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005). 28-43.
Livescu, K., etin Ö. Ç., Hasegawa-Johnson M., King S., Bartels C., Borges N., et al. (2007).  Articulatory Feature-Based Methods for Acoustic and Audio-Visual Speech Recognition: Summary from the 2006 Jhu Summer Workshop.
Black, A. W., H. Bunnell T., Dou Y., Kumar P., Metze F., Perry D., et al. (2012).  Articulatory Features for Expressive Speech Synthesis.
Sander, T. (1996).  Aspects of Algebraic Geometry over Non Algebraically Closed Fields.
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2014).  Assessing DNS Vulnerability to Record Injection.
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Maier, G., Feldmann A., Paxson V., Sommer R., & Vallentin M. (2011).  An Assessment of Overt Malicious Activity Manifest in Residential Networks.
Batliner, A., Steidl S., & Nöth E.. (2011).  Associating Children’s Non-Verbal and Verbal Behaviour: Body Movements, Emotions, and Laughter in a Human-Robot Interaction. 22-27.
Shenker, S. J., & Weinrib A. (1988).  Asymptotic Analysis of Large Heterogeneous Queuing Systems. Proceedings of the 1988 ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '88). 56-62.
Raman, S., McCanne S., & Shenker S. J. (1998).  Asymptotic Behavior of Global Recovery in SRM. Proceedings of the 1998 ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems. 90-99.

Pages