Publications

Found 1886 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
Technical Report
Stantchev, V. (2008).  Effects of Replication on Web Service Performance in WebSphere.
Karpinski, M., & Shparlinski I. (1994).  Efficient Approximation Algorithms for Sparse Polynomials over Finite Fields.
Storn, R. (1995).  Efficient Input Reordering for the DCT Based on a Real-Valued Decimation in Time FFT.
Szyperski, C., & Ventre G. (1993).  Efficient Multicasting for Interactive Multimedia Applications.
Stolcke, A. (1993).  An Efficient Probabilistic Context-Free Parsing Algorithm That Computes Prefix Probabilities.
M. Shokrollahi, A. (1995).  Elementary Proofs of Some Results on Representations of p-Groups.
Ananthanarayanan, G., Heimerl K., Zaharia M., Demmer M., Koponen T., Tavakoli A., et al. (2009).  Enabling Innovation Below the Communication API.
Ananthanarayanan, G., Heimerl K., Zaharia M., Demmer M., Koponen T., Tavakoli A., et al. (2009).  Enabling Innovation Below the Communication API.
Hasan, S., Ben-David Y., Scott C., Brewer E., & Shenker S. J. (2012).  Enabling Rural Connectivity with SDN.
Hasan, S., Ben-David Y., Scott C., Brewer E., & Shenker S. J. (2012).  Enabling Rural Connectivity with SDN.
Szyperski, C., Omohundro S., & Murer S. (1993).  Engineering a Programming Language: The Type and Class System of Sather.
Shastri, L. (2001).  Episodic Memory Trace Formation in the Hippocampal System: A Model of Cortico-Hippocampal Interaction.
Yoshida, M., Ikeda C., & Suzuki H. (1994).  An Evaluation of Burst-level Bandwidth Reservation Methods in WANEnvironments.
Krishnan, R., Allman M., Partridge C., & Sterbenz J. P. G. (2002).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks.
Sperduti, A. (1993).  Exploitation of Structured Gating Connections for the Normalization of a Visual Pattern.
Sommer, R., & Paxson V. (2004).  Exploiting Independent State For Network Intrusion Detection.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2012).  On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network Sites.
Shastri, L. (1997).  Exploiting Temporal Binding to Learn Relational Rules Within a Connectionist Network.
Shastri, L. (1997).  Exploiting Temporal Binding to Learn Relational Rules Within a Connectionist Network.
Afroz, S., Tschantz M. Carl, Sajid S., Qazi S. Asif, Javed M., & Paxson V. (2018).  Exploring Server-side Blocking of Regions.
Amann, J., Vallentin M., Hall S., & Sommer R. (2012).  Extracting Certificates from Live Traffic: A Near Real Time SSL Notary Service.
Séquin, C. H., & Clay R. D. (1990).  Fault Tolerance in Feed-Foward Artificial Neural Networks.
Chen, M-S., & Shin K. G. (1989).  Fault-Tolerant Routing in Hypercube Multicomputers Using Depth-First Search.
Schwarz, C., Teich J., Welzl E., & Evans B. (1994).  On Finding a Minimal Enclosing Parallelgram.
Sargent, M., Stack B., Dooner T., & Allman M. (2012).  A First Look at 1 Gbps Fiber-To-The-Home Traffic.

Pages