Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Karp, R. M. (1990).  An Introduction to Randomized Algorithms.
Karp, R. M., & Luby M. (1985).  Monte-Carlo Algorithms for the Planar Multiterminal Network Reliability Problem. Journal of Complexity. 1,
Karp, R. M. (1992).  On-line algorithms versus off-line algorithms: how much is it worth to know the future?. Proceedings of the IFIP 12th World Computer Congress on Algorithms, Software, Architecture - Information Processing '92. 416-429.
Karp, R. M. (1993).  Finite Branching Processes and AND/OR Tree Evaluation.
Karp, R. M., McKellar A.. C., & Wong C.. K. (1975).  Near-optimal Solutions to a 2-dimensional Placement Problem. SIAM Journal on Computing. 4(3), 271-286.
Karmarkar, N., Karp R. M., Lipton R. J., Lovász L., & Luby M. (1993).  A Monte-Carlo algorithm for estimating the permanent. SIAM Journal on Computing. 22(2), 284-293.
Karmarkar, N., Karp R. M., Lipton R. J., Lovász L., & Luby M. (1990).  A Monte-Carlo Algorithm for Estimating the Permanent.
Karmarkar, N., & Karp R. M. (1982).  An efficient approximation scheme for the one-dimensional bin-packing problem. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science. 312-320.
Karbasi, M., Abdelaziz A. Hussen, Meutzner H., & Kolossa D. (2016).  Blind Non-Intrusive Speech Intelligibility Prediction Using Twin-HMMs. Proceedings of Interspeech 2016.
Karbasi, M., Abdelaziz A. Hussen, & Kolossa D. (2016).  Twin-HMM-based Non-intrusive Speech Intelligibility Prediction. Proceedings of ICASSP.
Karayev, S., Fritz M., & Darrell T. (2014).  Anytime Recognition of Objects and Scenes.
Karayev, S., Hertzmann A., Winnemoeller H., Agarwala A., & Darrell T. (2014).  Recognizing Image Style.
Karayev, S., Fritz M., Fidler S., & Darrell T. (2011).  A Probabilistic Model for Recursive Factorized Image Features. 401-408.
Karayev, S., Baumgartner T., Fritz M., & Darrell T. (2012).  Timely Object Recognition.
Karami, M.., Park Y.., & McCoy D. (2015).  Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services.
Karagiannis, D., Kurfess F., & Schmidt H. W. (1991).  Knowledge Selection with ANNs.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Kapoor, A., Grauman K., Urtasun R., & Darrell T. (2010).  Gaussian Processes for Object Categorization. International Journal of Computer Vision. 88(2), 169-188.
Kantchelian, A., Tschantz M. Carl, Huang L., Bartlett P. L., Joseph A. D., & Tygar J.D.. (2014).  Large-margin Convex Polytope Machine. Proceedings of the 27th International Conference on Neural Information Processing Systems. 3248–3256.
Kantchelian, A., Tschantz M. Carl, Afroz S., Miller B., Shankar V., Bachwani R., et al. (2015).  Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 45–56.
Kannan, J., Jung J., Paxson V., & Koksal C. Emre (2006).  Semi-Automated Discovery of Application Session Structure. Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 119-132.
Kannan, J., Jung J., Paxson V., & Koksal C. Emre (2005).  Detecting Hidden Causality in Network Connections.
Kannan, S. (1989).  Program Checkers for Algebraic Problems.
Kannan, S. (1989).  Program Checkers for Algebraic Problems (Thesis).
Kannan, J. Kumar, Caesar M., Stoica I., & Shenker S. J. (2007).  On the Consistency of DHT-Based Routing.

Pages