Publications

Found 289 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Schryen, G. (2008).  Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. 37-50.
Kay, P. (2004).  Pragmatic Aspects of Grammatical Constructions.
Lee-Goldman, R., Ruppenhofer J., Ellsworth M., & Baker C. F. (2009).  Pragmatic Factors in Null Instantiation: Beyond Definiteness and Genre.
Petruck, M. R. L., & de Melo G. (2012).  Precedes: A Semantic Relation in FrameNet. 45-49.
Reischuk, R. (1993).  Precise Average Case Complexity Measures.
Martin, E., Vinyals O., Friedland G., & Bajcsy R.. (2010).  Precise Indoor Localization Using Smart Phones. 787-790.
Stolcke, A., & Segal J. (1994).  Precise n-gram Probabilities from Stochastic Context-free Grammars.
Hao, S., Kantchelian A., Miller B., Paxson V., & Feamster N. (2016).  PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. Proceedings of ACM CCS.
Tresp, V., Briegel T., & Moody J. (1999).  Predicting Blood Glucose Metabolism in Diabetics -- A Machine Learning Solution.
Egelman, S., & Peer E. (2015).  Predicting Privacy and Security Attitudes. Computers and Society: The Newsletter of ACM SIGCAS. 45(1), 22-28.
Krause, M., & Kulkarni A. (2015).  Predicting Sales E-Mail Responders using a Natural Language Model. Communications of the ACM. 38(11), 39-41.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2008).  Predicting the Resource Consumption of Network Intrusion Detection Systems. 135-154.
Moody, J., Levin A.., & Rehfuss S. (1993).  Predicting the U.S. Index of Industrial Production. Proceedings of Parallel Applications in Statistics and Economics '93. 3(6), 791-794.
Yosef, N.., Gramm J., Wang Q.-F.., Noble W.. S., Karp R. M., & Sharan R. (2010).  Prediction of Phenotype Information from Genotype Data. Communications in Information and Systems. 10(2), 99-114.
Moody, J. (1994).  Prediction Risk and Neural Network Architecture Selection.
Ellis, D. P. W. (1996).  Prediction-driven Computational Auditory Scene Analysis for Dense Sound Mixtures. Proceedings of the ESCA Workshop on the "Auditory Basis of Speech Perception".
Frederickson, G. N., & Guan D.. J. (1989).  Preemptive Ensemble Motion Planning on a Tree.
Nechaev, B., Allman M., Paxson V., & Gurtov A. (2010).  A Preliminary Analysis of TCP Performance in an Enterprise Network.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Regier, T. (1994).  A Preliminary Study of the Semantics of Reduplication.
Bergen, B. K., & Chang N. (2000).  Prepositional semantics in embodied construction grammar.
Hu, X., Gupta A., Feamster N., Panda A., & Shenker S. (2018).  Preserving Privacy at IXPs. Proceedings of the 2nd Asia-Pacific Workshop on Networking APNet '18.
Arianfar, S., Koponen T., Raghavan B., & Shenker S. (2011).  On Preserving Privacy in Information-Centric Networks. 19-24.
Padhukasahasram, B.., Halperin E., Wessel J.., Thomas D.. J., Silver E.., Trumbower H.., et al. (2010).  Presymptomatic Risk Assessment for Chronic Non-Communicable Diseases. PLoS ONE. 5,
Moody, J., & Wu L. (1995).  Price Behavior and Hurst Exponents of Tick-By-Tick Interbank Foreign Exchange Rates. Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).

Pages