Found 245 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Goldmann, M., & Karpinski M. (1994).  Simulating Threshold Circuits by Majority Circuits (Extended Version).
Goldreich, O., Ostrovsky R., & Petrank E. (1994).  Computational Complexity and Knowledge Complexity.
Goldreich, O. (1989).  A Note on Computational Indistinguishability.
Goldreich, O., & Ostrovsky R. (1993).  Software Protection and Simulation on Oblivious RAMs.
Goldwasser, S., & Ostrovsky R. (1992).  Invariant Signatures and Non-Interactive Zero-Knowledge Proofs Are Equivalent.
Gomes, B., Weissman B., & Feldman J. (1998).  Parallelizing Connectionist Networks for Pattern Recognition: A Library Approach. Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ’98).
Gomes, B., Weissman B., & Feldman J. (1998).  Active Threads: Enabling Fine-Grained Parallelism in Object-Oriented Languages. Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ’98).
Gomes, B., Stoutamire D., Weissman B., & Feldman J. (1997).  Using Value Semantic Abstractions to Guide Strongly Typed Library Design.
Gomes, B., Stoutamire D., & Weissman B. (1997).  Type-Safety and Overloading in Sather.
Gomes, B., Löwe W., Quittek J. W., & Weissman B. (1997).  Sather 2: A Language Design for Safe, High-Performance Computing.
Gómez-Skarmeta, A., & Ruiz P. M. (2005).  Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAM. Proceedings of the V Jornadas de Ingenieria Telematica.
Gomila, A., & Amengual A. (2009).  Moral Emotions for Autonomous Agents. 166-179.
Gonina, E., Friedland G., Cook H., & Keutzer K. (2011).  Fast Speaker Diarization Using a High-Level Scripting Language.
Gonina, E., Friedland G., Battenberg E., Koanantakool P., Driscoll M., Georganas E., et al. (2014).  Scalable Multimedia Content Analysis on Parallel Platforms Using Python. ACM Transactions on Multimedia Computing. 10(2), 
Gonzalez, J. Maria, & Paxson V. (2006).  Enhancing Network Intrusion Detection With Integrated Sampling and Filtering. Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006). 272-289.
Gonzalez, J. Maria, Paxson V., & Weaver N. (2007).  Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention. Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
Gonzalez, J. Maria, & Paxson V. (2003).  Pktd: A Packet Capture and Injection Daemon. Proceedings of Passive and Active Measurement Workshop (PAM-2003). 87-96.
Good, N., Grossklags J.., Dhamija R.., & Thaw D. (2005).  Stopping Spyware at the Gate: A User Study of Privacy, Notice, and Spyware. Proceedings of the Symposium On Usable Privacy and Security (SOUPS 2005). 43-52.
Gopalacharyulu, P. V., Velagapudi V.. R., Lindfors E., Halperin E., & Orešič M. (2009).  Dynamic Network Topology Changes in Functional Modules Predict Responses to Oxidative Stress in Yeast. Molecular BioSystems. 5(3), 276-287.
Gordo, B. (2015).  Guidelines for Socially Responsible, Inclusive Privacy Education. IEEE MultiMedia. 22(1), 13.
Gottlieb, L., & Friedland G. (2009).  On the Use of Artificial Conversation Data for Speaker Recognition in Cars. 124-128.
Gottlieb, L., Choi J., Kelm P., Sikora T., & Friedland G. (2012).  Pushing the Limits of Mechanical Turk: Qualifying the Crowd for Video Geo-Location. 23-28.
Gottlieb, L., Friedland G., Choi J., Kelm P., & Sikora T. (2014).  Creating Experts From the Crowd: Techniques for Finding Workers for Difficult Tasks. IEEE Transactions on Multimedia. 16(7), 2075-2079.
Govil, K., Chan E., & Wasserman H. (1995).  Comparing Algorithms for Dynamic Speed-Setting of a Low-Power CPU.
Govindan, R., Keshav S., & Verma D. C. (1989).  A Survey of Optical Fibers in Communication.